Abstract

A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses.

Highlights

  • Wireless sensor networks (WSNs) comprise a large number of sensor nodes, and are utilized in many environments, such as dangerous areas in which humans must be medically monitored, militarySensors 2015, 15 environments in which reconnaissance and communication must be carried out, and others

  • A temporal credential-based authenticated key agreement scheme for WSNs is composed of three classes of entity—users, sensor nodes and a gateway node (GWN)—and has registration, login, authentication and key agreement, and password change phases

  • This work addresses the weaknesses of the scheme of Li et al and proposes an efficient and secure temporal credential-based authenticated key agreement scheme for WSNs that uses extended chaotic maps, and involves operations that are more efficient than modular exponential computations and scalar multiplications on an elliptic curve [18,19,20]

Read more

Summary

Introduction

Wireless sensor networks (WSNs) comprise a large number of sensor nodes, and are utilized in many environments, such as dangerous areas in which humans must be medically monitored, military. A temporal credential-based authenticated key agreement scheme for WSNs is composed of three classes of entity—users, sensor nodes and a gateway node (GWN)—and has registration, login, authentication and key agreement, and password change phases. Authentication and key agreement phases, the user, the sensor node and GWN authenticate each other using these temporal credentials. The user and the each sensor node negotiate a common secret key with the help of GWN to establish a secure and authentication channel in the WSN. The adversary can derive all previous session keys of users and sensor nodes, and access all transmitted secrets. These temporal credential-based schemes for WSNs fail to resist possible attacks and to protect the privacy of users

Our Contributions
Enhanced Chebyshev Polynomial and Extended Chaotic Maps
Organization of the Paper
The Temporal Credential-Based Scheme of Li et al and Its Weaknesses
Pre-Registration Phase
Login Phase
Authentication and Key Agreement Phase
Vulnerability to Impersonation Attacks
Failure to Protect the Privacy of Users
Vulnerability to Stolen Verifier Attacks
Proposed Temporal Credential-Based Scheme Using Chaotic Maps for WSNs
Registration Phase for Users
Registration Phase for Sensor Nodes
Login and Authentication Phase
Security Analyses
Communicating Participants
Oracle Queries
Freshness
Providing Mutual Authentication
Protecting Privacy of Users
Resistance to Privileged Insider Attacks
Resistance to Impersonation Attacks
Resistance to Off-Line Password Guessing Attacks
Resistance to Undetectable On-Line Password Guessing Attacks
4.10. Resistance to Stolen Verifier Attacks
4.11. Resistance to Lost Smartcard Attacks
4.12. Resistance to Many Logged-in Users Attacks
Performance Analyses
Functionality Comparisons
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call